Cybersecurity, CIS133 - Chapter 5 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Bluetooth's rate of transmission is ____ Mbps.

1

Answer: True

1. Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.

Answer: d. bluesnarfing

10. Which type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers?

Answer: d. ad hoc

11. Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop. What is this type of network called?

Answer: a. strong alphanumeric password

12. What is the most secure option for the type of passcode that can be entered to access a mobile device?

Answer: a. encryption

13. What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable?

Answer: Wireless router or Wi-Fi router or wifi router

14. The ____________________ acts as the "base station" for the wireless devices, sending and receiving wireless signals between all devices as well as providing the "gateway" to the external Internet.

Answer: c. cell

16. What term is used to define an "area of coverage" in a wireless network?

Answer: d. Google Android

17. Which OS is not proprietary and is entirely open for anyone to use or modify?

Answer: d. preshared key (PSK)

18. When turning on WPA2 Personal, a key value must be configured. What is another name for this key value?

Answer: a. virtual private network

19. Which type of network uses an unsecured public network, such as the Internet, as if it were a secure private network?

Answer: True

2. Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.

Because of a security weakness it is important that key values exceed ____ at least characters in length.

20

Answer: wearable technology

20. A new class of mobile technology consisting of devices that can be worn by the user instead of carried

Answer: a. evil twin

3. An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called?

Answer: b. reset to factory settings

4. What security setting can cause a mobile device to erase installed apps and data if the passcode is incorrectly entered a number of times?

Answer: c. Wi-Fi Protected Setup (WPS)

5. Which of the following is an optional means of configuring WPA2 Personal security using a PIN?

Answer: d. sleep time

6. Which mobile device setting regulates when the device goes into hibernation mode?

Answer: b. SSID

7. What serves as the network name identifier in a Wi-Fi network?

Answer: b. virtual private network

8. What type of network uses an unsecured public network, such as the Internet, as if it were a secure private network?

IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.

802.11g

Answer: d. wireless router

9. Which type of Wi-Fi device acts as the base station for wireless devices as well as providing a gateway to the external Internet?

____ cryptography uses two keys.

Asymmetric

____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

Bluejacking

____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

Bluesnarfing

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.

Bluetooth

Whereas tablets are designed for performance, laptops are focused on ease of use.

False

Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.

False

In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.

IEEE

A(n) ____ address is a unique hardware number that is "burned in" to each wireless network interface card adapter.

MAC

____ cryptography uses same single key to encrypt and decrypt a document.

Private key

Answer is e. rooting

Removing the built-in limitations and protections on Google Android devices.

The ____ in a Wi-Fi network serves as the network name identifier.

SSID

Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.

True

Most Bluetooth devices have a range of only 33 feet (10 meters).

True

Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.

True

As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.

Wi-Fi Protected Setup (WPS)

Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop.

ad hoc

On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.

auto-lock

A(n) ____ is a method used by operating systems to store, retrieve, and organize files.

file system

Most encryption for data stored on a laptop uses ____ cryptography.

private key

On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen.

remote wipe

Private key cryptography is also called ____ cryptography.

symmetric

A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.

virtual private network

War driving is derived from the term ____.

war dialing

Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.

whole disk


संबंधित स्टडी सेट्स

Exploring Culture: Language Test

View Set

Chapter 22: PrepU - Nursing Management: Patients With Oral and Esophageal Disorders and Patients Receiving Gastrointestinal Intubation, Enteral, and Parenteral Nutrition

View Set

Nursing Care of the Child With an Alteration in Urinary Elimination/Genitourinary Disorder

View Set

Principles of Management: Final Exam

View Set

LC13: LearningCurve - Ch. 13: Fiscal Policy

View Set

Cybersecurity Essentials Chapter 3 Malware and Malicious Code

View Set